I'm not super well informed either but I feel like a lot of crypto tools already do this pretty well but the problem is adoption outside of nerd/hacker circles. A PGP key is a decent identity token, but how do you get a sclerotic bureaucracy to replace SSN with it?
-
-
-
You don't need government assistance or adoption of any kind off the bat, you can go through any company that loses money due to fraud, especially non-card fraud. You could be the winning advantage for other start ups that haven't yet become overburdened with bureaucracy
End of conversation
New conversation -
-
-
Gonna go out on a limb and suggest that we're all walking around with a few liters of the best possible ID system but adoption's going to be a bitch.
-
Sometimes you can tech/UX around some of the adoption issues, right? Kinda depends whether they're practical or regulatory, but there are always more & less friction-y ways to do things, and maybe therein lies the real technical challenge
End of conversation
New conversation -
-
-
Do you have something like this in mind? I assume resistance to fraud and theft would be a primary concern to any serious ID system attempt, here the emphasis is on being lightweight yet reliable. https://techcrunch.com/2018/04/11/element-identity/ …
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I always thought governments didn't create services in the best interest of the citizens, but assigning public funds to the businesses that would provide to the decision makers the greatest ROI in their secret bank accounts in some tax heaven as Cayman Islands. It explains a lot.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
This and your credit reporting tweet are pretty relevant to me (technical founder of both http://cognitohq.com and http://bloom.co ). Will share a few thoughts in followup tweets
-
For fraud, people tend to use http://siftscience.com and in-house data science/ML for automatic detection. Prevention falls more to 2FA, detecting unrecognized devices, etc. If you want to get extreme, you link user's phones and then also monitor to see if their phone is ported.
- Show replies
New conversation -
-
-
Check out
@KeybaseIO if you haven’t already. I think they’re doing a really good job bootstrapping an identity network, I use their chat and file storage systems heavilyThanks. Twitter will use this to make your timeline better. UndoUndo
-
-
-
I think one of the big hurdles is the prevention of one person having control over many identities.
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.